{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T04:27:57Z","timestamp":1742963277580,"version":"3.40.3"},"publisher-location":"Cham","reference-count":41,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030695132"},{"type":"electronic","value":"9783030695149"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-69514-9_12","type":"book-chapter","created":{"date-parts":[[2021,3,5]],"date-time":"2021-03-05T21:02:40Z","timestamp":1614978160000},"page":"135-156","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Hybrid Encryption Scheme for Secure Storage of Smart Grid Data"],"prefix":"10.1007","author":[{"given":"Jie","family":"Deng","sequence":"first","affiliation":[]},{"given":"Hai-Yan","family":"Kang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,3,6]]},"reference":[{"key":"12_CR1","doi-asserted-by":"crossref","unstructured":"Rajagopalan, S.R., Sankar, L., Mohajer, S., et al.: Smart meter privacy: a utility-privacy framework. In: IEEE International Conference on Smart Grid Communications 2011, Brussels, Belgium, pp. 190\u2013195. IEEE (2011)","DOI":"10.1109\/SmartGridComm.2011.6102315"},{"key":"12_CR2","doi-asserted-by":"crossref","unstructured":"Lu, Z., Lu, X., Wang, W., et al.: Review and evaluation of security threats on the communication networks in the smart grid. In: Military Communications Conference 2010, San Jose, pp. 1830\u20131835. IEEE (2010)","DOI":"10.1109\/MILCOM.2010.5679551"},{"key":"12_CR3","unstructured":"Liu, X.Y., Zhang, Q., Li, Z.M.: A survey on information security for smart grid. Electr. Power Inf. Commun. Technol. 12(4), 56\u201360 (2014)"},{"key":"12_CR4","doi-asserted-by":"crossref","unstructured":"Amin, S.M.: Smart grid security, privacy, and resilient architectures: opportunities and challenges. IEEE Power Energy Soc. Gen. Meet. 2012, SanDiego, pp. 1\u20132. IEEE (2012)","DOI":"10.1109\/PESGM.2012.6345767"},{"key":"12_CR5","doi-asserted-by":"crossref","unstructured":"Wang, X., Yi, P.: Security framework for wireless communications in smart distribution grid. IEEE Trans. Smart Grid 2(4), 809\u2013818 (2011)","DOI":"10.1109\/TSG.2011.2167354"},{"key":"12_CR6","doi-asserted-by":"crossref","unstructured":"Lim, H., Ko, J., Lee, S., et al.: Security architecture model for smart grid communication systems. In: International Conference on IT Convergence and Security 2013, Macao, pp. 327\u2013330. IEEE (2013)","DOI":"10.1109\/ICITCS.2013.6717880"},{"issue":"8","key":"12_CR7","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1109\/MCOM.2012.6257525","volume":"50","author":"X Li","year":"2012","unstructured":"Li, X., Liang, X., Lu, R., et al.: Securing smart grid: cyberattacks, countermeasures, and challenges. IEEE Commun. Mag. 50(8), 38\u201345 (2012)","journal-title":"IEEE Commun. Mag."},{"key":"12_CR8","unstructured":"Anandhi, A., Kalpana, G.: Securing smart grid communication against false data injection attacks. Wireless Commun. 8(5), 211\u2013215 (2016)"},{"key":"12_CR9","doi-asserted-by":"crossref","unstructured":"Bitzer, B., Gebretsadik, E.S.: Cloud computing framework for smart grid applications. In: Power Engineering Conference 48th International Universities 2013, pp. 1\u20135. IEEE (2013)","DOI":"10.1109\/UPEC.2013.6714855"},{"issue":"2","key":"12_CR10","doi-asserted-by":"publisher","first-page":"629","DOI":"10.1109\/JSYST.2013.2260942","volume":"8","author":"H Nicanfar","year":"2014","unstructured":"Nicanfar, H., Jokar, P., Beznosov, K., et al.: Efficient authentication and key management mechanisms for smart grid communications. IEEE Syst. J. 8(2), 629\u2013640 (2014)","journal-title":"IEEE Syst. J."},{"key":"12_CR11","unstructured":"Smart Grid Interoperability Panel Cyber Security Working Group: Introduction to NISTIR 7628 guidelines for smart grid cyber security [EB\/OL], USA, NIST Special Publication (2010). https:\/\/www.nist.gov\/smart-grid\/upload\/nistir-7628_total.pdf"},{"key":"12_CR12","unstructured":"Li, Y.C., Zhang, P., Zheng, S.Q.: Privacy protection of power consumption big data based on empirical mode decomposition and homomorphic encryption. Power Grid Technol. 43(05), 1810\u20131818 (2019)"},{"key":"12_CR13","doi-asserted-by":"crossref","unstructured":"Dehalwar, V., Kalam, A., Kolhe, M.L., et al.: Review of IEEE 802. 22 and IEC 61850 for real-time communication in smart grid. In: International Conference on Computing and Network Communications 2015, Trivandrum, India, pp. 571\u2013575. IEEE (2015)","DOI":"10.1109\/CoCoNet.2015.7411245"},{"key":"12_CR14","unstructured":"Fu, G., Zhou, N.R., Wen, H.: The study of security issues for the industrial control system communication protocols in smart grid system. Inf. Secur. Technol. 5(1), 36\u201338 (2014)"},{"key":"12_CR15","doi-asserted-by":"crossref","unstructured":"Premnath, A.P., Jo, J.Y., Kim, Y.: Application of NTRU cryptographic algorithm for SCADA security. In: 11th International Conference on Information Technology: New Generations 2014, Las Vegas, pp. 341\u2013346, IEEE (2014)","DOI":"10.1109\/ITNG.2014.38"},{"key":"12_CR16","unstructured":"Gao, K.T., Mao, Y.G., Xun, P., et al.: Light-weight key management solution for OSGP. J. Chin. Comput. Syst. 36(10), 166\u2013170 (2015)"},{"key":"12_CR17","doi-asserted-by":"crossref","unstructured":"Kumar, V., Hussain, M.: Secure communication for advance metering infrastructure in smart grid. In: Annual IEEE India Conference 2014, Pune, India, pp. 1\u20136. IEEE (2014)","DOI":"10.1109\/INDICON.2014.7030600"},{"key":"12_CR18","doi-asserted-by":"crossref","unstructured":"Tuchman, W.: Hellman presents no shortcut solutions to the des. IEEE Spectr. 16(7), 40\u201341 (1979)","DOI":"10.1109\/MSPEC.1979.6368160"},{"key":"12_CR19","doi-asserted-by":"crossref","unstructured":"Rivest, R.L., Shamir, A.,Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21(2), 120\u2013126 (1978)","DOI":"10.1145\/359340.359342"},{"key":"12_CR20","doi-asserted-by":"crossref","unstructured":"Feng, D.G., Zhang, M., Zhang, Y., Xu, Z.: Study on cloud computing security. J. Softw. 22(1), 71\u201383 (2011)","DOI":"10.3724\/SP.J.1001.2011.03958"},{"key":"12_CR21","unstructured":"Yi, Z.D., Duan, Y.Z., Xiao, C.W., et al.: Cloud computing security: concept, status quo and key technologies. Proceedings of the 27th National Conference on Computer Security (2012)"},{"key":"12_CR22","unstructured":"Gao, Y.Z., Li, B.L., Chen, X.Y.: Random detection algorithm of HDFS data theft based on MapReduce. J. Cryptologic Res. 39(10), 15\u201325 (2018)"},{"key":"12_CR23","doi-asserted-by":"crossref","unstructured":"Sivapragash, C., Thilaga, S.R., Kumar, S.S.: Advanced cloud computing in smart power grid. In: Sustainable Energy and Intelligent Systems 2012. IET Chennai 3rd International, pp. 1\u20136 (2012)","DOI":"10.1049\/cp.2012.2238"},{"key":"12_CR24","unstructured":"Li, Q.L., Zhou, M.T.: Research on cloud computing in smart grid. Comput. Sci. 38(B10), 432\u2013433 (2011)"},{"key":"12_CR25","unstructured":"Cong, W., Qian, W., Kui, R., et al.: Ensuring data storage security in cloud computing. In: 17th International WorkShop 2009. Quality of Service IWQoS, pp. 13\u201315 (2009)"},{"key":"12_CR26","doi-asserted-by":"crossref","unstructured":"Hashmi, M., Hanninen, S., Maki, K.: Survey of smart grid concepts, architectures, and technological demonstrations worldwide. In: 2011 IEEE PES Conference 2011 in Innovative Smart Grid Technologies, pp. 19\u201321 (2011)","DOI":"10.1109\/ISGT-LA.2011.6083192"},{"key":"12_CR27","unstructured":"Chen, J., Zhang, Y.Y.: Research on application and security of cloud computing in smart grid. ZTE Technol. 18(6), 17\u201321 (2012)"},{"key":"12_CR28","unstructured":"Huang, J.F., Wang, H.G., Qiang, Y.: Smart grid communications in challenging environments. In: 2012 IEEE Third International Conference 2012 in Smart Grid Communications, pp. 552\u2013557 (2012)"},{"key":"12_CR29","unstructured":"Wright, M.A.: The evolution of the advanced encryption standard. Netw. Secur. 1999(11), 11\u201314 (1999)"},{"key":"12_CR30","unstructured":"Chen, Q.C.: A hybrid encryption algorithm based on DES and RSA algorithm. Yunnan University, China (2015)"},{"key":"12_CR31","doi-asserted-by":"crossref","unstructured":"Jain, N., Ajnar, D.S., Jain, P.K.: Optimization of advanced encryption standard algorithm (AES) on field programmable gate array (FPGA). In: International Conference on Communication and Electronics Systems 2019. IEEE (2020)","DOI":"10.1109\/ICCES45898.2019.9002397"},{"key":"12_CR32","unstructured":"Gao, N.N., Li, Z.C., Wang, Q.: A reconfigurable architecture for high speed implementation of DES, 3DES and AES. Acta electronica Sinica 34(8), 1386\u20131390 (2006)"},{"key":"12_CR33","unstructured":"Yu, W.: Research on key extension method and security of DES algorithm. Central China Normal University, China (2019)"},{"key":"12_CR34","doi-asserted-by":"crossref","unstructured":"Sepahvandi, S., Hosseinza, M., Navi, K., et al.: IEEE 2009 International Conference on Research Challenges in Computer Science (ICRCCS), 28 November 2009\u201329 November 2009, Shanghai, China, 2009 International Conference on Research Challenges in Computer Science - An Improved Exponentiation Algorithm for RSA Cryptosystem, pp. 128\u2013132 (2009)","DOI":"10.1109\/ICRCCS.2009.40"},{"key":"12_CR35","unstructured":"Li, D.J., Wang, Y.D., Chen, H.: The research on key generation in RSA public-key cryptosystem. In: Fourth International Conference on Computational & Information Sciences. IEEE (2012)"},{"key":"12_CR36","unstructured":"Zhou, J.Z., Gao, L.: Research on improved RSA algorithm based on multi prime number and parameter replacement. Comput. Appl. Res. 36(02), 495\u2013498 (2019)"},{"key":"12_CR37","doi-asserted-by":"crossref","unstructured":"Yan, S.Y.: Elliptic Curve Cryptography. Cybercryptography: Applicable Cryptography for Cyberspace Security (2019)","DOI":"10.1007\/978-3-319-72536-9"},{"key":"12_CR38","unstructured":"Li, F., Gong, Z.Y., Lei, F.F., et al.: Summary of fast prime generation methods. J. Cryptologic Res. 06(04), 463\u2013476 (2019)"},{"key":"12_CR39","unstructured":"Qin, X.D., Xin, Y.W., Lu, G.Z.: Research and optimization of Miller Rabin algorithm. Comput. Eng. 28(10), 55\u201357 (2002)"},{"key":"12_CR40","unstructured":"Zhao, Y.W., Liu, F.F., Jiang, L.J., et al.: Multi core parallelization of Sch(o)nhage Strassen algorithm for large integer multiplication. J. Soft. 29(12), 3604\u20133613 (2018)"},{"key":"12_CR41","unstructured":"Fu, X.Q., Bao, W.S., Zhou, C., et al.: Integer factorization quantum algorithm with high probability. Acta electronica Sinica 39(01), 35\u201339 (2011)"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Smart Grid and Internet of Things"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-69514-9_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,3,5]],"date-time":"2021-03-05T21:14:24Z","timestamp":1614978864000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-69514-9_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030695132","9783030695149"],"references-count":41,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-69514-9_12","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"6 March 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SGIoT","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Smart Grid and Internet of Things","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"TaiChung","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Taiwan","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 December 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6 December 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"sgiot2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/sgiot.eai-conferences.org\/2020\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Confy+","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"159","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"40","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"25% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}